Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles by
Jeremiah Blocki
Differentially Private Compression and the Sensitivity of LZ77
23 September 2025 by
Jeremiah Blocki
and
others
at
Universidad Nacional de Colombia
Computational Complexity
,
Cryptography and Security
Towards Practical Data-Dependent Memory-Hard Functions with Optimal Sustained Space Trade-offs in the Parallel Random Oracle Model
9 August 2025 by
Jeremiah Blocki
and
Blake Holman
Cryptography and Security
Amortized Locally Decodable Codes for Insertions and Deletions
3 July 2025 by
Jeremiah Blocki
and
Justin Zhang
Information Theory
Amortized Locally Decodable Codes
16 June 2025 by
Jeremiah Blocki
and
Justin Zhang
Information Theory
,
Cryptography and Security
Differential privacy and Sublinear time are incompatible sometimes
13 January 2025 by
Jeremiah Blocki
and
others
Data Structures and Algorithms
,
Cryptography and Security
Conditional Encryption with Applications to Secure Personalized Password Typo Correction
10 September 2024 by
Mohammmad Hassan Ameri
and
Jeremiah Blocki
Cryptography and Security
The Impact of Reversibility on Parallel Pebbling
25 February 2024 by
Jeremiah Blocki
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Bandwidth-Hard Functions: Reductions and Lower Bounds
6 February 2024 by
Jeremiah Blocki
and
others
Cryptography and Security
,
Cryptology Foundations
How to Make Your Approximation Algorithm Private: A Black-Box Differentially-Private Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity
11 September 2023 by
Jeremiah Blocki
and
others
Data Structures and Algorithms
,
Cryptography and Security
Computationally Relaxed Locally Decodable Codes, Revisited
4 September 2023 by
Alexander Block
and
Jeremiah Blocki
at
Georgetown University
Information Theory
,
Cryptography and Security
Differentially Private
L_2
-Heavy Hitters in the Sliding Window Model
22 February 2023 by
Jeremiah Blocki
and
others
Data Structures and Algorithms
On the Multi-User Security of Short Schnorr Signatures with Preprocessing
7 February 2023 by
Jeremiah Blocki
and
Seunghoon Lee
Cryptography and Security
,
Cryptology
The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs
5 November 2022 by
Jeremiah Blocki
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
21 September 2022 by
Jeremiah Blocki
and
Peiyuan Liu
Cryptography and Security
On Relaxed Locally Decodable Codes for Hamming and Insertion-Deletion Errors
19 September 2022 by
Alex Block
and
others
Information Theory
,
Computational Complexity
Exponential Lower Bounds for Locally Decodable and Correctable Codes for Insertions and Deletions
17 September 2022 by
Jeremiah Blocki
and
others
Information Theory
,
Computational Complexity
Cost-Asymmetric Memory Hard Password Hashing
26 June 2022 by
Wenjie Bai
and
others
at
Purdue University
Cryptography and Security
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions
22 June 2022 by
Jeremiah Blocki
and
Blake Holman
Cryptography and Security
,
Cryptology Foundations
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
1 May 2022 by
Mohammmad Hassan Ameri
and
others
Cryptography and Security
,
Cryptology Foundations
On Explicit Constructions of Extremely Depth Robust Graphs
22 March 2022 by
Jeremiah Blocki
and
others
Data Structures and Algorithms
,
Cryptography and Security
Privately Estimating Graph Parameters in Sublinear time
14 March 2022 by
Jeremiah Blocki
and
others
Data Structures and Algorithms
,
Cryptography and Security
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision
21 February 2022 by
Aiping Xiong
and
others
Cryptography and Security
Differentially-Private Sublinear-Time Clustering
27 December 2021 by
Jeremiah Blocki
and
others
Machine Learning
,
Cryptography and Security
Parallel Quantum Pebbling: Analyzing the Post-Quantum Security of iMHFs
4 November 2021 by
Jeremiah Blocki
and
Seunghoon Lee
Quantum Physics
,
Computational Complexity
Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions
29 March 2021 by
Alexander Block
and
Jeremiah Blocki
at
Purdue University
Information Theory
,
Cryptography and Security
HACCLE: An Ecosystem for Building Secure Multi-Party Computations
15 March 2021 by
Yuyan Bao
and
others
at
Purdue University
Programming Languages
DAHash: Distribution Aware Tuning of Password Hashing Costs
30 January 2021 by
Wenjie Bai
and
Jeremiah Blocki
Cryptography and Security
,
Computer Science and Game Theory
Locally Decodable/Correctable Codes for Insertions and Deletions
19 November 2020 by
Alexander Block
and
others
at
Purdue University
Information Theory
On the Security of Proofs of Sequential Work in a Post-Quantum World
14 October 2020 by
Jeremiah Blocki
and
others
Cryptography and Security
A New Connection Between Node and Edge Depth Robust Graphs
29 September 2020 by
Jeremiah Blocki
and
Mike Cinkoske
Data Structures and Algorithms
,
Cryptography and Security
Load more
Articles by Jeremiah Blocki | Synthical